Quantcast
Channel: Baeldung
Browsing all 4535 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Exceptions in Netty

1. Overview In this quick article, we’ll be looking at exception handling in Netty. Simply put, Netty is a framework for building high-performance asynchronous and event-driven network applications....

View Article


Image may be NSFW.
Clik here to view.

Spring MVC Tutorial

1. Overview and Maven This is a simple Spring MVC tutorial showing how to set up a Spring MVC project, both with Java-based Configuration as well as with XML Configuration. The Maven artifacts for...

View Article


Image may be NSFW.
Clik here to view.

Getting Started with Java RMI

1. Overview When two JVMs need to communicate, Java RMI is one option we have to make that happen. In this article, we’ll bootstrap a simple example showcasing Java RMI technology. 2. Creating the...

View Article

Image may be NSFW.
Clik here to view.

Spring Boot Actuator

1. Overview In this article, we’re going to introduce Spring Boot Actuator. We’ll cover the basics first, then discuss in detail what’s available in Spring Boot 1.x vs 2.x. We’ll learn how to use,...

View Article

Image may be NSFW.
Clik here to view.

The Trie Data Structure in Java

1. Overview Data structures represent a crucial asset in computer programming, and knowing when and why to use them is very important. This article is a brief introduction to trie (pronounced “try”)...

View Article


Image may be NSFW.
Clik here to view.

Creating and Configuring Jetty 9 Server in Java

1. Overview In this article, we’ll talk about creating and configuring a Jetty instance programmatically. Jetty is an HTTP server and servlet container designed to be lightweight and easily...

View Article

Image may be NSFW.
Clik here to view.

Spring 5 and Servlet 4 – The PushBuilder

1. Introduction The Server Push technology — part of HTTP/2 (RFC 7540) — allows us to send resources to the client proactively from the server-side. This is a major change from HTTP/1.X pull-based...

View Article

Image may be NSFW.
Clik here to view.

An Example of Load Balancing with Zuul and Eureka

1. Overview In this article, we’ll look at how load balancing works with Zuul and Eureka. We’ll route requests to a REST Service discovered by Spring Cloud Eureka through Zuul Proxy. 2. Initial Setup...

View Article


Image may be NSFW.
Clik here to view.

Spring Security – Auto Login User After Registration

1. Overview In this quick tutorial, we’ll discuss how to auto-authenticate users immediately after the registration process – in a Spring Security implementation. Simply put, once the user finishes...

View Article


Image may be NSFW.
Clik here to view.

An Introduction to Kong

1. Introduction Kong is an open-source API gateway and microservice management layer. Based on Nginx and the lua-nginx-module (specifically OpenResty), Kong’s pluggable architecture makes it flexible...

View Article

Image may be NSFW.
Clik here to view.

Extra Login Fields with Spring Security

1. Introduction In this article, we’ll implement a custom authentication scenario with Spring Security by adding an extra field to the standard login form. We’re going to focus on 2 different...

View Article

Image may be NSFW.
Clik here to view.

A Guide to the finalize Method in Java

1. Overview In this tutorial, we’ll focus on a core aspect of the Java language – the finalize method provided by the root Object class. Simply put, this is called before the garbage collection for a...

View Article

Image may be NSFW.
Clik here to view.

Java Weekly, Issue 213

Here we go… 1. Spring and Java >> Fumigating the IDEA Ultimate code using dataflow analysis [blog.jetbrains.com] A deep dive into the how code inspection in works in IntelliJ. >> Immutable...

View Article


Image may be NSFW.
Clik here to view.

How to Manually Authenticate User with Spring Security

1. Overview In this quick article, we’ll focus on how to programmatically set an authenticated user in Spring Security and Spring MVC. 2. Spring Security Simply put, Spring Security hold the principal...

View Article

Image may be NSFW.
Clik here to view.

Intoduction to Spliterator in Java

1. Overview The Spliterator interface, introduced in Java 8, can be used for traversing and partitioning sequences. It’s a base utility for Streams, especially parallel ones. In this article, we’ll...

View Article


Image may be NSFW.
Clik here to view.

Geospatial Support in ElasticSearch

1. Introduction Elasticsearch is best known for its full-text search capabilities but it also features full geospatial support. We can find more about setting up Elasticsearch and getting started in...

View Article

Image may be NSFW.
Clik here to view.

Introduction to Lettuce – the Java Redis Client

1. Overview This article is an introduction to Lettuce, a Redis Java client. Redis is an in-memory key-value store that can be used as a database, cache or message broker. Data is added, queried,...

View Article


Image may be NSFW.
Clik here to view.

Introduction to Javadoc

1. Overview Good API documentation is one of the many factors contributing to the overall success of a software project. Fortunately, all modern versions of the JDK provide the Javadoc tool – for...

View Article

Image may be NSFW.
Clik here to view.

HTTP Requests with Kotlin and khttp

1. Introduction The HTTP protocol and APIs built on it are of central importance in programming these days. On the JVM we have several available options, from lower-level to very high-level libraries,...

View Article

Image may be NSFW.
Clik here to view.

Get Log Output in JSON

1. Introduction Most Java logging libraries today offer different layout options for formatting logs – to accurately fit the needs of each project. In this quick article, we want to format and output...

View Article
Browsing all 4535 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>